Gil Br (2014-10-28 15:58):
All,

I installed the latest LDAP Plugin for Jenkins.
When I use ldap://server.name I get *no* error under the LDAP Server line, however when I use ldap*s*://server.name:636 I get the following error: /Unable to connect to ldaps://server.name:636 : javax.naming.CommunicationException: simple bind failed: server.name:636 [Root exception is javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target]//
//
//[...]/

Most probably your LDAP uses a certifacte that is not valid on Jenkins box. This is when you have a self generated certificate. You would probably have to install CA on your Jenkins box.

In either case (ldaps or ldap) I get login failed when I try to login with my NT user/password, Jenkins runs on windows.

I haven't tried using ldap protocol in server address but that should work for Active Directory LDAP:

    * server: your.domain.com
    * rootDN: DC=your,DC=domain,DC=com
    * userSearchBase: CN=Users
    * user search filter: sAMAccountName={0}
    * managerDN: DOMAIN\someUser
    * managerPassword: someUser password

AFAIK `userSearchBase` and `user search filter` are the same for all Active Directory installations.

Regards,
Nux

--
You received this message because you are subscribed to the Google Groups "Jenkins 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jenkinsci-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to